Verifiable Fairness Micropayment Scheme Based on Commitment
LIU Yining①② ZHAO Quanyu①
①(School of Mathematics and Computational Science, Guilin University of Electronic Technology, Guilin 541004, China) ②(Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China)
Due to the large transaction number and tiny value in micropayment, it is not practical to authenticate each transaction. Micali et al. (2002) propose a lottery-based micropayment to integrate multiple micropayment to one macro-payment that is worth using complicated authentication. Liu-Yan scheme (2013) guarantees the result is verifiable by involving all participants’ data. However, there still exists a flaw that the malicious bank maybe obtain the illegal benefit by controlling the specific purchaser not be selected to execute the macro-payment, moreover, this attack can not be detected. In this paper, the flaw is firstly described, then, an improved version is proposed. Specifically the model “multiple purchasers to 1 merchant”in Liu-Yan’s scheme is replaced with a new model “1 purchaser to 1 merchant”, which guarantees the fairness and verifiability for all using the commitment technique.
YANG Chingnung and WU Chihcheng. MSRC: Micropayment scheme with ability to return changes[J]. Mathematical and Computer Modelling, 2013, 58(1/2): 96-107. doi: 10.1016/j.mcm.2012.07.010.
WANG Tao, YAO Songtao, and GUO Heqing. Research on the application of secure micropayment technology in security auditing of distributed system[J]. Journal on Communications, 2005, 26(5): 118-121.
[3]
GHAFOORI Z, DEHGHAN M, and NOURHOSEINI M. PPayWord: A Secure and Fast P2P Micropayment Scheme for Video Streaming[M]. Springer International Publishing Switzerland, Springer International Publishing, 2014: 79-91. doi: 10.1007/978-3-319-10903-9_7.
[4]
HWANG Shinjia. Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures[M]. Springer Science Business Media Dordrecht, Springer Netherlands, 2014: 905-909. doi: 10.1007/978-94-007-7262-5_103.
[5]
CHA Byungrae, LEE Sanghun, PARK Soobong, et al. Design of micropayment to strengthen security by 2 factor authentication with mobile and wearable devices[J]. Advanced Science and Technology Letters, 2015, 109(7): 28-32. doi: org/10.14257/astl.2015.109.07.
[6]
DECKER C and WATTENHOFER R. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels[M]. Springer International Publishing Switzerland, Springer International Publishing, 2015: 3-18. doi: 10.1007/ 978-3-319-21741-3_1.
[7]
CHEUNG Helen and YANG Cungang. A secure electronic payment protocol for wireless mesh networks[J]. International Journal of Network Security and Its Applications, 2014, 6(5): 1-22. doi: 10.5121/ijnsa.2014.6501.
[8]
YEN Sungming, LIN Hsichug, CHEN Yenchang, et al. PayStar: A denomination flexible micropayment scheme[J]. Information Sciences, 2014, 259: 160-169. doi: 10.1016/ j.ins.2013.07.031.
[9]
BIRYUKOV A and PUSTOGAROV I. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay[M]. Springer Verlag Berlin Heidelberg, Springer Berlin Heidelberg, 2015: 445-455. doi: 10.1007/978-3-662-47854-7_27.
WAN Renfu, LI Fangwei, and ZHU Jiang. An efficient authentication and payment protocol for mobile communication[J]. Journal of Electronics & Information Technology, 2005, 27(3): 498-501.
[12]
RIVEST R L and SHAMIR A. Payword and micromint: Two simple micropayment scheme[C]. International Workshop on Security Protocols, Springer-Verlag, 1997, 1189: 69-87. doi: 10.1007/3-540-62494-5_6.
[13]
RIVEST R L. Electronic lottery tickets as micropayments[C]. International Conference on Financial Cryptography, Springer Berlin Heidelberg, 1997: 307-314. doi: 10.1007/ 3-540-63594-7_87.
[14]
SILVIO M and RIVEST R L. Micropayment Revisited[C]. Topics in Cryptology CT-RSA 2002, Springer Berlin Heidelberg, 2002: 149-163. doi: 10.1007/3-540-45760-7_11.
[15]
RAFAEL M, HOMERO T, JOEL R, et al. P2PM-pay: Person to person mobile payment scheme controlled by expiration date[J]. Wireless Personal Communications, 2015, 85(1): 289-304. doi: 10.1007/s11277-015-2738-y.
[16]
LIU Yining, HU Lei, and LIU Heguo. A micropayment scheme based on weighted multi-dimensional hash chain[J]. Journal of Electronics (China), 2006, 23(5): 791-794. doi: 10.1007/s11767-005-0219-2.
[17]
LIU Yining and YAN Jihong. A lightweight micropayment scheme based on Lagrange interpolation formula[J]. Security and Communication Networks, 2013, 6(8): 955-960. doi: 10.1002/sec.643.
[18]
SAZE G. Generation of key pre-distribution schemes using secret sharing scheme[J]. Discrete Applied Mathematics, 2003, 128(1): 239-249. doi: 10.1016/S1571-0653(04)00173-8.